scholarly journals Equivalence of DES and AES Algorithm with Cellular Automata

Author(s):  
Sambhu Prasad Panda ◽  
Madhusmita Sahu ◽  
Umesh Prasad Rout ◽  
Surendra Kumar Nanda

In this paper we present the equivalence of the operations involved in DES and AES algorithm with operations of cellular automata. We identify all the permutation and substitution operations involved in DES and AES algorithm and compare these operations with the cellular automata rules. Then we find that permutation operations involved in DES and AES are equivalent to linear cellular automata rules providing diffusion property of cryptography whereas substitution operations involved in DES and AES are equivalent to non linear cellular automata rules providing the confusion property of cryptography. Hence instead of using operations involved in DES and AES algorithm, we can apply linear as well as non-linear cellular automata rules in cryptography for better security and parallel processing.

1991 ◽  
Vol 248 ◽  
Author(s):  
M. A. Smith ◽  
Y. Bar-Yam ◽  
Y. Rabin ◽  
N. Margolus ◽  
T. Toffoli ◽  
...  

AbstractIn order to improve our ability to simulate the complex behavior of polymers, we introduce dynamical models in the class of Cellular Automata (CA). Space partitioning methods enable us to overcome fundamental obstacles to large scale simulation of connected chains with excluded volume by parallel processing computers. A highly efficient, two-space algorithm is devised and tested on both Cellular Automata Machines (CAMs) and serial computers. Preliminary results on the static and dynamic properties of polymers in two dimensions are reported.


2019 ◽  
Vol 28 (4) ◽  
pp. 430-448
Author(s):  
Sara D Cardell ◽  
Diego F Aranha ◽  
Amparo Fúster-Sabater

Abstract The sequences produced by the cryptographic sequence generator known as the shrinking generator can be modelled as the output sequences of linear elementary cellular automata (CA). These sequences are composed of interleaved m-sequences produced by linear structures based on feedback shifts. This profitable characteristic can be used in the cryptanalysis of this generator. In this work we propose an algorithm that takes advantage of the inherent linearity of these CA and the interleaved m-sequences. Although irregularly decimated generators have been conceived and designed as non-linear ones, in practice they can be easily analysed in terms of simple linear structures.


2020 ◽  
Vol 24 (1) ◽  
Author(s):  
Antonio Jorge Tomeu Hardasmal ◽  
Alberto Gabriel Salguero Hidalgo ◽  
Santiago Zaldívar

2020 ◽  
Vol 24 (1) ◽  
Author(s):  
Antonio Jorge Tomeu Hardasmal ◽  
Alberto Gabriel Salguero Hidalgo ◽  
Santiago Zaldívar

Sign in / Sign up

Export Citation Format

Share Document